edr-bypass
There are 50 repositories under edr-bypass topic.
klezVirus/inceptor
Template-Driven AV/EDR Evasion Framework
tkmru/awesome-edr-bypass
Awesome EDR Bypass Resources For Ethical Hacking
NUL0x4C/AtomPePacker
A Highly capable Pe Packer
VirtualAlllocEx/DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
georgesotiriadis/Chimera
Automated DLL Sideloading Tool With EDR Evasion Capabilities
WesleyWong420/RedTeamOps-Havoc-101
Materials for the workshop "Red Team Ops: Havoc 101"
f1zm0/acheron
indirect syscalls for AV/EDR evasion in Go assembly
VirtualAlllocEx/Create-Thread-Shellcode-Fetcher
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
fortra/hw-call-stack
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
V-i-x-x/AMSI-BYPASS
"AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS
dobin/antnium
A C2 framework for initial access in Go
VirtualAlllocEx/Direct-Syscalls-vs-Indirect-Syscalls
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
mrexodia/lolbin-poc
Small PoC of using a Microsoft signed executable as a lolbin.
VirtualAlllocEx/Direct-Syscalls-A-journey-from-high-to-low
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
njcve/inflate.py
Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.
thomasxm/BOAZ_beta
Multilayered AV/EDR Evasion Framework
VirtualAlllocEx/DSC_SVC_REMOTE
This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service path, etc. The payload itself can be remotely hosted, downloaded via the wininet library and then executed via direct system calls.
0mWindyBug/MinifilterHook
silence file system monitoring components by hooking their minifilters
roadwy/SideloadFinder
frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can later be weaponized during Red Team Operations to evade AV/EDR's.
itaymigdal/PichichiH0ll0wer
Nim process hollowing loader
coleak2021/hidedump
Hidedump:a lsassdump tools that may bypass EDR
Adkali/PowerJoker
PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
Chainski/PandaLoader
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.
CodeXTF2/evasion-adventures-files
Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"
VirtualAlllocEx/Create_Thread_Inline_Assembly_x86
This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly
x0reaxeax/SilentWrite
PoC arbitrary WPM without a process handle
melotic/nanostorm
An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.
x0reaxeax/SysCook64
Indirect Syscall invocation via thread hijacking
Offensive-Panda/WPM-MAJIC-ENTRY-POINT-INJECTION
This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission and write the shellcode.
VirtualAlllocEx/Shell-we-Assembly
Shellcode execution via x86 inline assembly based on MSVC syntax
x0reaxeax/SyscallHookBypass
NTAPI hook bypass with (semi) legit stack trace
0xflux/Rust-Hells-Gate
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
EvilBytecode/Ntdll-Unhook
Unhook Ntdll.dll, Go & C++.
PapkuWorld/Rat-Botnet
Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Project Under Development)
Offensive-Panda/PEB_WALK_AND_API_OBFUSCATION_INJECTION
This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.